To reconstruct attacks from packet captures.
What sets SEC503 apart is its unique "bottom-up" approach to cybersecurity. Rather than simply teaching how to use security software, the course focuses on the fundamental mechanics of network protocols. Students are trained to "read" network traffic at the bit and byte level, often interpreting hexadecimal code without the aid of automated tools. Course Structure and Syllabus
The training is typically delivered over six intensive days, combining theory with over 37 hands-on labs.
Explores behavioral detection using Zeek (formerly Bro), large-scale analytics with SiLK , and advanced network forensics.
To reconstruct attacks from packet captures.
What sets SEC503 apart is its unique "bottom-up" approach to cybersecurity. Rather than simply teaching how to use security software, the course focuses on the fundamental mechanics of network protocols. Students are trained to "read" network traffic at the bit and byte level, often interpreting hexadecimal code without the aid of automated tools. Course Structure and Syllabus sec503 intrusion detection indepth pdf 258
The training is typically delivered over six intensive days, combining theory with over 37 hands-on labs. To reconstruct attacks from packet captures
Explores behavioral detection using Zeek (formerly Bro), large-scale analytics with SiLK , and advanced network forensics. large-scale analytics with SiLK